Browse Results

Showing 35,176 through 35,200 of 53,536 results

Transforming Entrepreneurship Education: Interdisciplinary Insights on Innovative Methods and Formats

by Jantje Halberstadt Antonieta Alcorta de Bronstein Jean Greyling Shaun Bissett

This open access book provides selected teaching approaches, supporting methods, concrete examples of curricula as well as extracurricular teaching formats, which are predominantly tailored to both African and German requirements. These approaches were developed by the YEEES Training and Research Centers, an international interdisciplinary network of university teachers and researchers from Germany and southern Africa, and combine the fields of management, entrepreneurship, information and communication technologies (ICT), and sustainability. The book shows how current scientific results can be integrated into teaching, how students can contribute to research while learning, and how research can contribute to the development and evaluation of new formats. It is thus relevant for university teachers, researchers, students as well as practitioners who want to educate and act as future change agents.

The Skeleton Crew: How Amateur Sleuths Are Solving America's Coldest Cases

by Deborah Halber

Solving cold cases from the comfort of your living room…<P> The Skeleton Crew provides an entree into the gritty and tumultuous world of Sherlock Holmes–wannabes who race to beat out law enforcement—and one another—at matching missing persons with unidentified remains.<P> In America today, upwards of forty thousand people are dead and unaccounted for. These murder, suicide, and accident victims, separated from their names, are being adopted by the bizarre online world of amateur sleuths.<P> It’s DIY CSI.<P> The web sleuths pore over facial reconstructions (a sort of Facebook for the dead) and other online clues as they vie to solve cold cases and tally up personal scorecards of dead bodies. The Skeleton Crew delves into the macabre underside of the Internet, the fleeting nature of identity, and how even the most ordinary citizen with a laptop and a knack for puzzles can reinvent herself as a web sleuth.

Harnessing the Power of Analytics

by Leila Halawi Amal Clarke Kelly George

This text highlights the difference between analytics and data science, using predictive analytic techniques to analyze different historical data, including aviation data and concrete data, interpreting the predictive models, and highlighting the steps to deploy the models and the steps ahead. The book combines the conceptual perspective and a hands-on approach to predictive analytics using SAS VIYA, an analytic and data management platform. The authors use SAS VIYA to focus on analytics to solve problems, highlight how analytics is applied in the airline and business environment, and compare several different modeling techniques. They decipher complex algorithms to demonstrate how they can be applied and explained within improving decisions.

Sicherheitsgerichtete Echtzeitsysteme

by Wolfgang A. Halang Rudolf M. Konakovsky

Das Buch behandelt das wichtige Thema Sicherheit bei elektronischen Systemen. Anhand begrifflicher, methodischer und konzeptioneller Grundlagen sicherheitsgerichteter Echtzeitsysteme wird in die Denkweise der Sicherheitstechnik eingeführt. Architekturen für sichere Hardware sowie Verfahren zur Erstellung möglichst fehlerfreier Software und zu deren Verifizierung werden dargestellt und quantitativ bewertet. Weiterhin werden Ergebnisse jüngster Forschungen vorgestellt, so u.a. inhärent sicherheitsfördernde Paradigmen der Echtzeitprogrammierung und -ablauforganisation sowie unkonventionelle sicherheitsgerichtete Architekturen für sicherheitstechnisch abnehmbare Feldbusse und programmierbare elektronische Systeme. Das Buch wurde für die 2. Auflage gründlich überarbeitet und um die Darstellung neuer Patente erweitert.

Sicherheitsgerichtete Echtzeitsysteme

by Wolfgang A. Halang Rudolf M. Konakovsky

Das Buch behandelt das wichtige Thema funktionale Sicherheit programmierbarer elektronischer Systeme. Anhand begrifflicher, methodischer und konzeptioneller Grundlagen sicherheitsgerichteter Echtzeitsysteme wird in die Denkweise der Sicherheitstechnik eingeführt. Architekturen für sichere Hardware sowie Verfahren zur Erstellung möglichst fehlerfreier Software und zu deren Verifizierung werden dargestellt und bewertet. Weiterhin werden Ergebnisse jüngster Forschungen vorgestellt wie inhärent sicherheitsfördernde Paradigmen der Echtzeitprogrammierung und -ablauforganisation oder unkonventionelle sicherheitsgerichtete Architekturen für sicherheitstechnisch abnehmbare Feldbusse und programmierbare elektronische Systeme.Das Buch wurde für die 3. Auflage gründlich überarbeitet und um die Darstellung neuer Patente und Normen erweitert. Die ZielgruppenStudierende der Automatisierungstechnik und der Informatik sowie Systemarchitekten und Entwickler.

Nicht hackbare Rechner und nicht brechbare Kryptographie

by Wolfgang A. Halang Robert Fitz

Viren, Würmer, Trojanische Pferde, das Arsenal der Hackerangriffe auf IT-Infrastrukturen scheint unerschöpflich. Nachdem Computerwurm Stuxnet 2010 das Steuerungssystem eines iranischen Atomkraftwerks befallen hatte und Computer durch die Malware Flame ferngesteuert und ausspioniert wurden, sorgte 2015 ein Virus namens Duqu 2.0 für Schlagzeilen, weil er die IT von Unternehmen in Europa, Asien und den USA infiziert hatte. Was aber wenn Computer grundsätzlich gegen solche Hackerangriffe immun wären? Wissenschaftlich fundiert und zugleich verständlich geschrieben, zeigen die beiden IT-Experten in ihrem Buch, wie Computer mithilfe von bekannten technischen Verfahren so konstruiert werden können, dass Hackerangriffe grundsätzlich an ihnen abprallen. Zum einen setzen die Autoren für die IT-Sicherheit auf eine Rechnerarchitektur, die in mindestens zwei Segmente unterteilt ist: in einen schreibgeschützten und für Programme nicht beeinflussbaren Bereich sowie einen nicht-schreibgeschützten Bereich für Daten gibt, die sich oft ändern. Kombiniert unter anderem mit effektiven Verschlüsselungs- und Verschleierungsverfahren, einer sichereren Authentifizierung der Nutzer etwa durch biometrische Merkmale sowie sicheren virtuellen Adressen und Seitenverzeichnisstartadressen werden Computer unangreifbar für Software, die unerlaubt in den Rechner eindringt und Daten abschöpft.Die Autoren gehen in ihrer technisch-wissenschaftlich exakten Darstellung auf folgende Fragen ein:- Wie sicher sind Rechner und Netze heute?- Wie funktionieren Angriffe mit Stuxnet, Flame und Duqu und wie die Methoden zu ihrer Abwehr?- Welchen Schutz bieten Harvard- und Von-Neumann-Architekturen (VNA)?- Wie sehen neuartige Schutzmaßnahmen aus und wie können mobile Geräte geschützt werden?- Wie funktioniert sichere Datenverschlüsselung und -verschleierung?Das Buch richtet sich an IT-Experten und IT-Sicherheitsverantwortliche in Unternehmen und Organisationen und an alle, die sich für Fragen der Daten- und Netzsicherheit interessieren. Für das Verständnis sind nur elementare Vorkenntnisse erforderlich.

Ageing of Integrated Circuits: Causes, Effects and Mitigation Techniques

by Basel Halak

This book provides comprehensive coverage of the latest research into integrated circuits’ ageing, explaining the causes of this phenomenon, describing its effects on electronic systems, and providing mitigation techniques to build ageing-resilient circuits.

Authentication of Embedded Devices: Technologies, Protocols and Emerging Applications

by Basel Halak

This book provides comprehensive coverage of state-of-the-art integrated circuit authentication techniques, including technologies, protocols and emerging applications.The authors first discuss emerging solutions for embedding unforgeable identifies into electronics devices, using techniques such as IC fingerprinting, physically unclonable functions and voltage-over-scaling. Coverage then turns to authentications protocols, with a special focus on resource-constrained devices, first giving an overview of the limitation of existing solutions and then presenting a number of new protocols, which provide better physical security and lower energy dissipation. The third part of the book focuses on emerging security applications for authentication schemes, including securing hardware supply chains, hardware-based device attestation and GPS spoofing attack detection and survival.Provides deep insight into the security threats undermining existing integrated circuit authentication techniques;Includes an in-depth discussion of the emerging technologies used to embed unforgeable identifies into electronics systems;Offers a comprehensive summary of existing authentication protocols and their limitations;Describes state-of-the-art authentication protocols that provide better physical security and more efficient energy consumption;Includes detailed case studies on the emerging applications of IC authentication schemes.

Hardware Supply Chain Security: Threat Modelling, Emerging Attacks and Countermeasures

by Basel Halak

This book presents a new threat modelling approach that specifically targets the hardware supply chain, covering security risks throughout the lifecycle of an electronic system. The authors present a case study on a new type of security attack, which combines two forms of attack mechanisms from two different stages of the IC supply chain. More specifically, this attack targets the newly developed, light cipher (Ascon) and demonstrates how it can be broken easily, when its implementation is compromised with a hardware Trojan. This book also discusses emerging countermeasures, including anti-counterfeit design techniques for resources constrained devices and anomaly detection methods for embedded systems.

Machine Learning for Embedded System Security

by Basel Halak

This book comprehensively covers the state-of-the-art security applications of machine learning techniques. The first part explains the emerging solutions for anti-tamper design, IC Counterfeits detection and hardware Trojan identification. It also explains the latest development of deep-learning-based modeling attacks on physically unclonable functions and outlines the design principles of more resilient PUF architectures. The second discusses the use of machine learning to mitigate the risks of security attacks on cyber-physical systems, with a particular focus on power plants. The third part provides an in-depth insight into the principles of malware analysis in embedded systems and describes how the usage of supervised learning techniques provides an effective approach to tackle software vulnerabilities.

Physically Unclonable Functions: From Basic Design Principles To Advanced Hardware Security Applications

by Basel Halak

This book discusses the design principles of physically unclonable functions (PUFs) and how these can be employed in hardware-based security applications, in particular, the book provides readers with a comprehensive overview of security threats and existing countermeasures.This book has many features that make it a unique source for students, engineers and educators, including more than 80 problems and worked exercises, in addition to, approximately 200 references, which give extensive direction for further reading.

New Trends in Aggregation Theory (Advances in Intelligent Systems and Computing #981)

by Radomír Halaš Marek Gagolewski Radko Mesiar

This book collects the contributions presented at AGOP 2019, the 10th International Summer School on Aggregation Operators, which took place in Olomouc (Czech Republic) in July 2019. It includes contributions on topics ranging from the theory and foundations of aggregation functions to their various applications. Aggregation functions have numerous applications, including, but not limited to, data fusion, statistics, image processing, and decision-making. They are usually defined as those functions that are monotone with respect to each input and that satisfy various natural boundary conditions. In particular settings, these conditions might be relaxed or otherwise customized according to the user’s needs. Noteworthy classes of aggregation functions include means, t-norms and t-conorms, uninorms and nullnorms, copulas and fuzzy integrals (e.g., the Choquet and Sugeno integrals). This book provides a valuable overview of recent research trends in this area.

A Complete Guide to Character Rigging for Games Using Blender

by Armin Halač

This book is a comprehensive guide to using Blender to create character rigs for games, breaking down the technicalities of rigging tools and techniques into easily digestible chunks. It provides all the tools needed to go from a static character model to an animation-ready, high quality, and fast performing game rig. Written to be accessible and easy to follow, the book covers character rigging theory that is supported by industry standard examples of how to apply that theory to character rigs for video games. It demonstrates the reasoning behind rigging decisions followed by instructions and examples on how to apply that knowledge to rig creation. It includes chapters that focus on the character deformation techniques that raise the visual quality of the model and subsequently of the animation and game it will be used in. This book will be vital reading to those studying games animation as well as early-career rigging artists, character animators, modeling artists, technical animators, and technical artists.

Algorithms and Networking for Computer Games

by Harri Hakonen Jouni Smed

The essential guide to solving algorithmic and networking problems in commercial computer games, revised and extended Algorithms and Networking for Computer Games, Second Edition is written from the perspective of the computer scientist. Combining algorithmic knowledge and game-related problems, it explores the most common problems encountered in game programing. The first part of the book presents practical algorithms for solving “classical” topics, such as random numbers, procedural generation, tournaments, group formations and game trees. The authors also focus on how to find a path in, create the terrain of, and make decisions in the game world. The second part introduces networking related problems in computer games, focusing on four key questions: how to hide the inherent communication delay, how to best exploit limited network resources, how to cope with cheating and how to measure the on-line game data. Thoroughly revised, updated, and expanded to reflect the many constituent changes occurring in the commercial gaming industry since the original, this Second Edition, like the first, is a timely, comprehensive resource offering deeper algorithmic insight and more extensive coverage of game-specific networking problems than ordinarily encountered in game development books. Algorithms and Networking for Computer Games, Second Edition: Provides algorithmic solutions in pseudo-code format, which emphasises the idea behind the solution, and can easily be written into a programming language of choice Features a section on the Synthetic player, covering decision-making, influence maps, finite-state machines, flocking, fuzzy sets, and probabilistic reasoning and noise generation Contains in-depth treatment of network communication, including dead-reckoning, local perception filters, cheating prevention and on-line metrics Now includes 73 ready-to-use algorithms and 247 illustrative exercises Algorithms and Networking for Computer Games, Second Edition is a must-have resource for advanced undergraduate and graduate students taking computer game related courses, postgraduate researchers in game-related topics, and developers interested in deepening their knowledge of the theoretical underpinnings of computer games and in learning new approaches to game design and programming.

Sociality and Normativity for Robots

by Raul Hakli Johanna Seibt

This volume offers eleven philosophical investigations into our future relations with social robots--robots that are specially designed to engage and connect with human beings. The contributors present cutting edge research that examines whether, and on which terms, robots can become members of human societies. Can our relations to robots be said to be "social"? Can robots enter into normative relationships with human beings? How will human social relations change when we interact with robots at work and at home? The authors of this volume explore these questions from the perspective of philosophy, cognitive science, psychology, and robotics. The first three chapters offer a taxonomy for the classification of simulated social interactions, investigate whether human social interactions with robots can be genuine, and discuss the significance of social relations for the formation of human individuality. Subsequent chapters clarify whether robots could be said to actually follow social norms, whether they could live up to the social meaning of care in caregiving professions, and how we will need to program robots so that they can negotiate the conventions of human social space and collaborate with humans. Can we perform joint actions with robots, where both sides need to honour commitments, and how will such new commitments and practices change our regional cultures? The authors connect research in social robotics and empirical studies in Human-Robot Interaction to recent debates in social ontology, social cognition, as well as ethics and philosophy of technology. The book is a response to the challenge that social robotics presents for our traditional conceptions of social interaction, which presuppose such essential capacities as consciousness, intentionality, agency, and normative understanding. The authors develop insightful answers along new interdisciplinary pathways in "robophilosophy," a new research area that will help us to shape the "robot revolution," the distinctive technological change of the beginning 21st century.

Cyber-Physical Security: Protecting Critical Infrastructure at the State and Local Level (Protecting Critical Infrastructure #3)

by Simon Hakim Robert M. Clark

This book focuses on the vulnerabilities of state and local services to cyber-threats and suggests possible protective action that might be taken against such threats. Cyber-threats to U. S. critical infrastructure are of growing concern to policymakers, managers and consumers. Information and communications technology (ICT) is ubiquitous and many ICT devices and other components are interdependent; therefore, disruption of one component may have a negative, cascading effect on others. Cyber-attacks might include denial of service, theft or manipulation of data. Damage to critical infrastructure through a cyber-based attack could have a significant impact on the national security, the economy, and the livelihood and safety of many individual citizens. Traditionally cyber security has generally been viewed as being focused on higher level threats such as those against the internet or the Federal government. Little attention has been paid to cyber-security at the state and local level. However, these governmental units play a critical role in providing services to local residents and consequently are highly vulnerable to cyber-threats. The failure of these services, such as waste water collection and water supply, transportation, public safety, utility services, and communication services, would pose a great threat to the public. Featuring contributions from leading experts in the field, this volume is intended for state and local government officials and managers, state and Federal officials, academics, and public policy specialists.

Energy Efficient High Performance Processors: Recent Approaches For Designing Green High Performance Computing (Computer Architecture and Design Methodologies)

by Jawad Haj-Yahya Avi Mendelson Yosi Ben Asher Anupam Chattopadhyay

This book explores energy efficiency techniques for high-performance computing (HPC) systems using power-management methods. Adopting a step-by-step approach, it describes power-management flows, algorithms and mechanism that are employed in modern processors such as Intel Sandy Bridge, Haswell, Skylake and other architectures (e.g. ARM). Further, it includes practical examples and recent studies demonstrating how modem processors dynamically manage wide power ranges, from a few milliwatts in the lowest idle power state, to tens of watts in turbo state. Moreover, the book explains how thermal and power deliveries are managed in the context this huge power range. The book also discusses the different metrics for energy efficiency, presents several methods and applications of the power and energy estimation, and shows how by using innovative power estimation methods and new algorithms modern processors are able to optimize metrics such as power, energy, and performance. Different power estimation tools are presented, including tools that break down the power consumption of modern processors at sub-processor core/thread granularity. The book also investigates software, firmware and hardware coordination methods of reducing power consumption, for example a compiler-assisted power management method to overcome power excursions. Lastly, it examines firmware algorithms for dynamic cache resizing and dynamic voltage and frequency scaling (DVFS) for memory sub-systems.

Codes, Cryptology and Information Security: 4th International Conference, C2SI 2023, Rabat, Morocco, May 29–31, 2023, Proceedings (Lecture Notes in Computer Science #13874)

by Said El Hajji Sihem Mesnager El Mamoun Souidi

This book constitutes the refereed proceedings of the 4th International Conference on Codes, Cryptology and Information Security, C2SI 2023, held in Rabat, Morocco, during May 29–31, 2023. The 21 full papers included in this book were carefully reviewed and selected from 62 submissions. They were organized in topical sections as follows: Invited Papers, Cryptography, Information Security, Discrete Mathematics, Coding Theory.

Proceedings of the 2nd International Conference on Electronic Engineering and Renewable Energy Systems: ICEERE 2020, 13-15 April 2020, Saidia, Morocco (Lecture Notes in Electrical Engineering #681)

by Bekkay Hajji Adel Mellit Giuseppe Marco Tina Abdelhamid Rabhi Jerome Launay Salah Eddine Naimi

This book includes papers presented at the Second International Conference on Electronic Engineering and Renewable Energy (ICEERE 2020), which focus on the application of artificial intelligence techniques, emerging technology and the Internet of things in electrical and renewable energy systems, including hybrid systems, micro-grids, networking, smart health applications, smart grid, mechatronics and electric vehicles. It particularly focuses on new renewable energy technologies for agricultural and rural areas to promote the development of the Euro-Mediterranean region. Given its scope, the book is of interest to graduate students, researchers and practicing engineers working in the fields of electronic engineering and renewable energy.

A Practical Guide for Simulation and FPGA Implementation of Digital Design (Computer Architecture and Design Methodologies)

by Bekkay Hajji Adel Mellit Loubna Bouselham

This book introduces the FPGA technology used in the laboratory sessions, and provides a step-by-step guide for designing and simulation of digital circuits. It utilizes the VHDL language, which is one of the most common language used to describe the design of digital systems. The Quartus II, Xilinx ISE 14.7 and ModelSim software are used to process the VHDL code and make simulations, and then the Altera and Xilinx FPGA platforms are employed to implement the simulated digital designs. The book is composed of four parts. The first part of this book has two chapters and covers various aspects: FPGA architectures, ASIC vs FPGA comparison, FPGA design flow and basic VHDL concepts necessary to describe the design of digital systems. The second part of the book includes three chapters that deal with the design of digital circuits such as combinational logic circuits, sequential logic circuits and finite state machines. The third part of the book is reserved for laboratory projects carried out on the FPGA platform. It is a largely hands-on lab class for design digital circuits and implementing their designs on the Altera FPGA platform. Finally, the fourth part of this work is devoted to recent applications carried out on FPGAs, in particular advanced techniques in renewable energy systems. The book is primarily intended for students, scholars, and industrial practitioners interested in the design of modern digital systems.

The Internet of Mechanical Things: The IoT Framework for Mechanical Engineers

by Sami Salama Hajjaj Kisheen Rao Gsangaya

This book provides knowledge, skills, and strategies an engineer requires to effectively integrate Internet of Things (IoT) into the field of mechanical engineering. Divided into three sections named IoT Strategies, IoT Foundation topics, and IoT system development, the volume covers introduction to IoT framework, its components, advantages, challenges, and practical process for effective implementation of IoT from mechanical engineering perspective. Further, it explains IoT systems and hands-on training modules, implementation, and execution of IoT Systems. Features: Presents exclusive material on application of IoT in mechanical engineering. Combines theory and practice including relevant terminologies and hands-on. Emphasis on use of IoT to streamline operations, reduce costs, and increased profits. Focusses on development and implementation of Raspberry Pi and Arduino based IoT systems. Illustrates use IoT data to improve performance of robots, machines, and systems. This book aims at Researchers, Graduate students in Mechanical Engineering, Computer Programming, Automobile, Robotics, and Industry 4.0/automation.

Progressive Web Apps with Angular: Create Responsive, Fast and Reliable PWAs Using Angular

by Majid Hajian

Harness the power of Angular to build fast, high performance progressive web apps that work offline. Learn exactly how to create an Angular Progressive Web App (PWA) from scratch, how you can use different tools to audit and improve it, and leverage Angular CLI or Workbox to turn your app into a PWA. Using browser APIs – including the Credential Management, Payment Request, Geolocation, Web Bluetooth, WebUSB and Generic Sensors APIs – you can unleash the potential of PWAs and build applications that enhance user experience. Angular’s game-changing built-in features, including the Angular service worker module, can be leveraged to construct responsive and reliable PWAs that can look and feel just like native mobile apps. You'll learn how to boost your app speed, how to increase user engagement using push notifications, and how to implement offline storage and different caching APIs in Angular. You'll even see how to convert an existing Angular app into a PWA. Whether you’re new to building PWAs, or want to learn how to use Angular to improve your app development, Progressive Web Apps with Angular provides the know-how to build and deploy an Angular PWA.What Readers Will LearnBuild an Angular app that looks and feels just like a native mobile appAudit and improve an Angular PWA with different toolsIncrease user engagement by using push notificationsOffline storage and different caching APIs in AngularImplement modern technologies into an Angular PWAWho This Book Is For Developers with basic knowledge of HTML, JavaScript and Angular

Application of Soft Computing and Intelligent Methods in Geophysics (Springer Geophysics)

by Alireza Hajian Peter Styles

This book provides a practical guide to applying soft-computing methods to interpret geophysical data. It discusses the design of neural networks with Matlab for geophysical data, as well as fuzzy logic and neuro-fuzzy concepts and their applications. In addition, it describes genetic algorithms for the automatic and/or intelligent processing and interpretation of geophysical data.

Intelligent Methods with Applications in Volcanology and Seismology (Advances in Volcanology)

by Alireza Hajian Giuseppe Nunnari Roohollah Kimiaefar

This book presents intelligent methods like neural, neuro-fuzzy, machine learning, deep learning and metaheuristic methods and their applications in both volcanology and seismology. The complex system of volcanoes and also earthquakes is a big challenge to identify their behavior using available models, which motivates scientists to apply non-model based methods. As there are lots of seismology and volcanology data sets, i.e., the local and global networks, one solution is using intelligent methods in which data-based algorithms are used.

Topics in Theoretical Computer Science

by Mohammad Taghi Hajiaghayi Mohammad Reza Mousavi

This book constitutes the thoroughly refereedpost-conference proceedings of the First IFIP WG 1. 8 International Conferenceon Topics in Theoretical Computer Science, held in Tehran, Iran, in August2015. The 10 full papers presented together with 3invited talks were carefully reviewed and selected from 48 submissions. Thepapers feature novel and high-quality research in all areas of theoreticalcomputer science.

Refine Search

Showing 35,176 through 35,200 of 53,536 results